{"id":91613,"date":"2023-03-29T17:34:53","date_gmt":"2023-03-29T12:04:53","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=91613"},"modified":"2023-06-17T16:24:28","modified_gmt":"2023-06-17T10:54:28","slug":"deep-dive-into-royal-ransomware","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/deep-dive-into-royal-ransomware\/","title":{"rendered":"Deep Dive into Royal Ransomware"},"content":{"rendered":"\r\n<p><span style=\"color: #000000;\">The rise of ransomware and malware variants has been a growing concern for individuals and organizations alike. With new strains of malicious software emerging every day, the threat landscape has become increasingly complex and dangerous. Let&#8217;s delve into the world of ransomware and explore how we can protect ourselves against this ever-evolving threat<\/span><span style=\"color: #000000;\"><span style=\"font-family: Arial, serif;\"><span style=\"font-size: small;\">.<\/span><\/span><\/span><\/p>\r\n<h3><span class=\"TextRun SCXW205305864 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW205305864 BCX0\">Introduction<\/span><\/span><span class=\"EOP SCXW205305864 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\r\n<p style=\"text-align: left;\">The Royal Ransomware was first observed in mid-2022. It is a type of ransomware that encrypts all volumes including network shared drives. The Royal Ransomware uses the<b>\u201c.Royal\u201c, <\/b>and<b> \u201c.Royal_w\u201d<\/b> extension on the encrypted files instead of some randomly generated extensions like other ransomware use. The group behind Royal Ransomware operates independently. The group drops the ransom note with the name <b>README.TXT<\/b> which contains the unique \u201c<b>tor\u201d<\/b> link for further communication with the attacker. This ransomware is distributed through torrent<span style=\"color: #000000;\"> sites, <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-internet-security\">malicious<\/a> attachments, and more. This ransomware uses the AES algorithm with the key and IV encryptions using the RSA. The encryption of the file is decided on the basis of the <\/span><span style=\"color: #000000;\"><b>\u201c-ep\u201d<\/b><\/span><span style=\"color: #000000;\"> parameter.<\/span><\/p>\r\n<h3><span class=\"TextRun SCXW220738440 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW220738440 BCX0\">Timeline of Ransomware<\/span><\/span><span class=\"EOP SCXW220738440 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91629 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/Fig1-Timeline-of-Royal-Ransomware-650x238.png\" alt=\"\" width=\"650\" height=\"238\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/Fig1-Timeline-of-Royal-Ransomware-650x238.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/Fig1-Timeline-of-Royal-Ransomware-300x110.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/Fig1-Timeline-of-Royal-Ransomware-768x282.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/Fig1-Timeline-of-Royal-Ransomware-789x289.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/Fig1-Timeline-of-Royal-Ransomware-150x55.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/Fig1-Timeline-of-Royal-Ransomware.png 867w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\r\n<p align=\"CENTER\"><em><span class=\"TextRun SCXW8817727 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW8817727 BCX0\"><span class=\"TextRun SCXW83045522 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW83045522 BCX0\">Timeline of Royal Ransomware<\/span><\/span><\/span><\/span><\/em><\/p>\r\n<h3><span class=\"TextRun SCXW144330648 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW144330648 BCX0\">T<\/span><span class=\"NormalTextRun SCXW144330648 BCX0\">echnical A<\/span><span class=\"NormalTextRun SCXW144330648 BCX0\">nalysis<\/span><span class=\"NormalTextRun SCXW144330648 BCX0\">:<\/span><\/span><span class=\"EOP SCXW144330648 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\r\n<p>On initial execution, the Royal ransomware takes the command line arguments; Path, id, and ep, where the id is a 32-bit array, and ep is the encryption percentage.<\/p>\r\n<p><i style=\"font-size: small;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91630 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/Fig2-calling-cmd-with-arguments-e1680005669963-650x248.png\" alt=\"\" width=\"650\" height=\"248\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/Fig2-calling-cmd-with-arguments-e1680005669963-650x248.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/Fig2-calling-cmd-with-arguments-e1680005669963-300x114.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/Fig2-calling-cmd-with-arguments-e1680005669963-150x57.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/Fig2-calling-cmd-with-arguments-e1680005669963.png 714w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/i><\/p>\r\n<p style=\"text-align: center;\"><em><span class=\"NormalTextRun SCXW107398221 BCX0\">Calling <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SpellingErrorHighlight SCXW107398221 BCX0\">cmd<\/span><span class=\"NormalTextRun SCXW107398221 BCX0\"> with arguments<\/span><\/em><\/p>\r\n<h5><b><span data-contrast=\"auto\">Deletion of Shadow Copies:<\/span><\/b><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h5>\r\n<p><span data-contrast=\"auto\">Volume shadow copies are deleted to prevent system restoration.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\r\n<p><span data-contrast=\"auto\">vssadmin.exe Delete Shadows \/All \/Quiet<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\r\n<p style=\"text-align: center;\"><i style=\"font-size: small; text-align: -webkit-center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91631 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/Fig3-Deletion-of-shadow-copy-e1680006853880-650x115.png\" alt=\"\" width=\"650\" height=\"115\" \/><\/i><span style=\"font-size: small;\"><i>Deletion of shadow copy<\/i><\/span><\/p>\r\n<p>Before the encryption process, it creates a list for the exclusion of extensions and directories which are further used by threads at the time of encryption. In the new variant. Royal_w and .Royal_u are added in the excluded extensions.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91649 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig4_1-e1680006659757-650x319.png\" alt=\"\" width=\"650\" height=\"319\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig4_1-e1680006659757-650x319.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig4_1-e1680006659757-300x147.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig4_1-e1680006659757-150x74.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig4_1-e1680006659757.png 768w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\r\n<p style=\"text-align: center;\"><em><span class=\"NormalTextRun SCXW174885775 BCX0\">L<\/span><span class=\"NormalTextRun SCXW174885775 BCX0\">ist of directories and <\/span><span class=\"NormalTextRun SCXW174885775 BCX0\">extensions<\/span><span class=\"NormalTextRun SCXW174885775 BCX0\"> to be excluded from the encryption process<\/span><span class=\"NormalTextRun SCXW174885775 BCX0\">.<\/span><\/em><\/p>\r\n<p>&nbsp;<\/p>\r\n<p><span class=\"TextRun SCXW175096112 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW175096112 BCX0\">List of <\/span><span class=\"NormalTextRun SCXW175096112 BCX0\">e<\/span><span class=\"NormalTextRun SCXW175096112 BCX0\">xtensions <\/span><span class=\"NormalTextRun SCXW175096112 BCX0\">e<\/span><span class=\"NormalTextRun SCXW175096112 BCX0\">xcluded<\/span><span class=\"NormalTextRun SCXW175096112 BCX0\"> &#8211;<\/span><\/span><\/p>\r\n<table style=\"height: 198px;\" border=\"1\" width=\"604\" cellspacing=\"0\" cellpadding=\"4\">\r\n<tbody>\r\n<tr>\r\n<td width=\"96\" height=\"20\">\r\n<p>.exe<\/p>\r\n<\/td>\r\n<td width=\"100\">\r\n<p>.dll<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"96\" height=\"18\">\r\n<p>.bat<\/p>\r\n<\/td>\r\n<td width=\"100\">\r\n<p>.lnk<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"96\" height=\"18\">\r\n<p>.royal<\/p>\r\n<\/td>\r\n<td width=\"100\">\r\n<p>.royal_w<\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p>&nbsp;<\/p>\r\n<p>List of directories excluded &#8211;<\/p>\r\n<table style=\"height: 268px;\" border=\"1\" width=\"602\" cellspacing=\"0\" cellpadding=\"4\">\r\n<tbody>\r\n<tr>\r\n<td width=\"97\" height=\"21\">\r\n<p>windows<\/p>\r\n<\/td>\r\n<td width=\"100\">\r\n<p>royal<\/p>\r\n<\/td>\r\n<td width=\"106\">\r\n<p>$recycle.bin<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"97\" height=\"19\">\r\n<p>google<\/p>\r\n<\/td>\r\n<td width=\"100\">\r\n<p>perflogs<\/p>\r\n<\/td>\r\n<td width=\"106\">\r\n<p>mozilla<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"97\" height=\"19\">\r\n<p>tor browser<\/p>\r\n<\/td>\r\n<td width=\"100\">\r\n<p>boot<\/p>\r\n<\/td>\r\n<td width=\"106\">\r\n<p>$windows.~ws<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td width=\"97\" height=\"19\">\r\n<p>$windows.~bt<\/p>\r\n<\/td>\r\n<td width=\"100\">\r\n<p>Windows.old<\/p>\r\n<\/td>\r\n<td width=\"106\">\u00a0<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p>&nbsp;<\/p>\r\n<h4><span class=\"TextRun SCXW205125762 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW205125762 BCX0\">File Encryption:<\/span><\/span><span class=\"EOP SCXW205125762 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h4>\r\n<p>The ransomware uses the GetNativeSystemInfo API to retrieve the number of processors in a machine, then it multiplies the result by two and creates a number of threads.<br \/>These threads are responsible for the file encryption process.<\/p>\r\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91634\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig5_1.png\" alt=\"\" width=\"662\" height=\"117\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig5_1.png 662w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig5_1-300x53.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig5_1-650x115.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig5_1-150x27.png 150w\" sizes=\"(max-width: 662px) 100vw, 662px\" \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91635\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig6_1.png\" alt=\"\" width=\"663\" height=\"228\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig6_1.png 663w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig6_1-300x103.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig6_1-650x224.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig6_1-150x52.png 150w\" sizes=\"(max-width: 663px) 100vw, 663px\" \/><em><span class=\"TextRun SCXW97659244 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW97659244 BCX0\">Thread creation<\/span><\/span><\/em><\/p>\r\n<p>With the help of Restart Manager, it checks if there are any files that are being used by the other processes.<\/p>\r\n<p>Royal ransomware uses the RmGetList APIs to verify which process is using the resources, and then, it compares it with explorer.exe. If the process is not explorer.exe, it calls the RmShutDown API to kill those processes.<\/p>\r\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91636 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig7-e1680006999372-576x390.png\" alt=\"\" width=\"576\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig7-e1680006999372-576x390.png 576w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig7-e1680006999372-300x203.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig7-e1680006999372-150x101.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig7-e1680006999372.png 742w\" sizes=\"(max-width: 576px) 100vw, 576px\" \/><i><\/i><\/p>\r\n<p style=\"text-align: center;\"><em><span class=\"TextRun SCXW10039504 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"> <span class=\"NormalTextRun SCXW10039504 BCX0\">Process kill through\u00a0 <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW10039504 BCX0\">RmShutDown<\/span><span class=\"NormalTextRun SCXW10039504 BCX0\"> API<\/span><\/span><span class=\"EOP SCXW10039504 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/em><\/p>\r\n<p>Royal Ransomware uses the RSA public key for encrypting AES key and IV. And the RSA Public key is embedded in the executable.<\/p>\r\n<p align=\"CENTER\">\u00a0<\/p>\r\n<p align=\"CENTER\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91637 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig8-650x238.png\" alt=\"\" width=\"650\" height=\"238\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig8-650x238.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig8-300x110.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig8-150x55.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig8.png 767w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\r\n<p align=\"CENTER\"><em><span class=\"TextRun SCXW15653213 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW15653213 BCX0\">RSA Public Key<\/span><\/span><\/em><\/p>\r\n<p>It enumerates the Drives with the API call GetLogicalDrives and adds the README.TXT in each drive, as illustrated in the following images.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91638 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig9-650x133.png\" alt=\"\" width=\"650\" height=\"133\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig9-650x133.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig9-300x61.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig9-150x31.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig9.png 761w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\r\n<p align=\"CENTER\"><em>E<span class=\"NormalTextRun SCXW51535530 BCX0\">numeration<\/span><span class=\"NormalTextRun SCXW51535530 BCX0\"> of <\/span><span class=\"NormalTextRun SCXW51535530 BCX0\">Logical<\/span> <span class=\"NormalTextRun SCXW51535530 BCX0\">Drives<\/span><\/em><\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91639 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig10-650x322.png\" alt=\"\" width=\"650\" height=\"322\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig10-650x322.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig10-300x149.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig10-768x381.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig10-789x391.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig10-150x74.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig10.png 944w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\r\n<p align=\"CENTER\"><em><span class=\"TextRun SCXW69701831 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW69701831 BCX0\"> Readme file is created at A:<\/span><\/span><\/em><span class=\"TextRun SCXW69701831 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW69701831 BCX0\">\\\\<\/span><\/span><\/p>\r\n<p>To compare the Directories and the Extension for the exclusion, it uses the API strstrIW. In the figure below the excluded directory and extensions are compared with the current directory and file respectively.<\/p>\r\n<p>&nbsp;<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91640 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig11-e1680007054414-650x112.png\" alt=\"\" width=\"650\" height=\"112\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig11-e1680007054414-650x112.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig11-e1680007054414-300x52.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig11-e1680007054414-768x132.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig11-e1680007054414-789x136.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig11-e1680007054414-150x26.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig11-e1680007054414.png 867w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\r\n<p align=\"CENTER\"><em><span class=\"TextRun SCXW13163363 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW13163363 BCX0\">Comparing directory and extension to the Excluded list<\/span><\/span><\/em><\/p>\r\n<p>After the encryption through the AES algorithm, it uses the MoveFileExW API to append the extension \u201c.royal\u201d.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91641 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig12-650x133.png\" alt=\"\" width=\"650\" height=\"133\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig12-650x133.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig12-300x61.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig12-768x157.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig12-789x161.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig12-150x31.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig12.png 963w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\r\n<p align=\"CENTER\"><em><span class=\"NormalTextRun SCXW127675171 BCX0\">Adding the <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW127675171 BCX0\">\u201c.royal<\/span><span class=\"NormalTextRun SCXW127675171 BCX0\">\u201d<\/span> <span class=\"NormalTextRun SCXW127675171 BCX0\">extension<\/span><\/em><\/p>\r\n<p><span data-contrast=\"auto\">The encryption is based on two parameters, i.e. file size and the value of ep. If ep is not provided, it encrypts based on the files size parameter, as per the following:-<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<ul>\r\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">If the file size is smaller than or equal to 5MB, the entire file will be encrypted.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\r\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">If the file size is larger than 5MB, only partial (50%) encryption is done.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\r\n<\/ul>\r\n<p><span data-contrast=\"auto\">After the encryption of the file, it writes the size of the file followed by the encryption percentage in hex at the end of the files. We can see this in the following encrypted file, as an example: &#8211;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91642 size-full\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig13-e1680007121834.png\" alt=\"\" width=\"598\" height=\"472\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig13-e1680007121834.png 598w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig13-e1680007121834-300x237.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig13-e1680007121834-494x390.png 494w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig13-e1680007121834-150x118.png 150w\" sizes=\"(max-width: 598px) 100vw, 598px\" \/><\/p>\r\n<p align=\"CENTER\"><em><span class=\"NormalTextRun SCXW149352394 BCX0\">Encrypted file 1<\/span><\/em><\/p>\r\n<p align=\"CENTER\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-91643\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig14.png\" alt=\"\" width=\"609\" height=\"520\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig14.png 609w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig14-300x256.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig14-457x390.png 457w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig14-150x128.png 150w\" sizes=\"(max-width: 609px) 100vw, 609px\" \/><\/p>\r\n<p align=\"CENTER\"><em><span class=\"NormalTextRun SCXW149352394 BCX0\">Encrypted file 2<\/span><\/em><\/p>\r\n<p>After encryption, it uses the \u201c.royal \u201d extension.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91644 size-medium\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig15-e1680007151148-300x102.png\" alt=\"\" width=\"300\" height=\"102\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig15-e1680007151148-300x102.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig15-e1680007151148-150x51.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig15-e1680007151148.png 553w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\r\n<p align=\"CENTER\"><em><span class=\"NormalTextRun SCXW149352394 BCX0\">Encrypted files by the \u201c.<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW149352394 BCX0\">royal<\/span><span class=\"NormalTextRun SCXW149352394 BCX0\">\u201d extension<\/span><\/em><\/p>\r\n<p align=\"CENTER\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91645 size-medium\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig16-e1680007177266-300x100.png\" alt=\"\" width=\"300\" height=\"100\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig16-e1680007177266-300x100.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig16-e1680007177266-150x50.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig16-e1680007177266.png 499w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\r\n<p align=\"CENTER\"><em><span class=\"NormalTextRun SCXW149352394 BCX0\">Encrypted files by the \u201c.<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW149352394 BCX0\">royal_w<\/span><span class=\"NormalTextRun SCXW149352394 BCX0\">\u201d extension<\/span><\/em><\/p>\r\n<p style=\"text-align: left;\" align=\"CENTER\">\u00a0<\/p>\r\n<p align=\"CENTER\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-91646 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2023\/03\/fig18-e1680007350207-650x315.png\" alt=\"\" width=\"650\" height=\"315\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig18-e1680007350207-650x315.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig18-e1680007350207-300x145.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig18-e1680007350207-768x372.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig18-e1680007350207-789x382.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig18-e1680007350207-150x73.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2023\/03\/fig18-e1680007350207.png 1011w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\r\n<p align=\"CENTER\"><em><span class=\"TextRun SCXW241948210 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW241948210 BCX0\">Ransom Note<\/span><\/span><\/em><\/p>\r\n<p>Royal Ransomware drops the \u201cREADME\u201d file in every encrypted directory. It uses the tor link for further communication purposes.<\/p>\r\n<h3 class=\"western\"><span class=\"EOP SCXW42478172 BCX0\" data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"><span class=\"TextRun SCXW14836795 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW14836795 BCX0\" data-ccp-parastyle=\"heading 3\">How do we prevent such kinds of attacks? <\/span><\/span><span class=\"EOP SCXW14836795 BCX0\" data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span> <\/span><\/h3>\r\n<ul>\r\n<li><span data-contrast=\"auto\">Do not download and open any attachments from unknown sources. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\r\n<li><span data-contrast=\"auto\">Avoid clicking on any unverified links. The main <a href=\"https:\/\/blogs.quickheal.com\/the-perils-of-ransomware-how-to-save-yourself-from-the-next-attack\/\">cause of ransomware attacks<\/a> happens due to clicking on untrusted links and attachments. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\r\n<li><span data-contrast=\"auto\">Keep your software and antivirus updated. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\r\n<li><span data-contrast=\"auto\">Back up your data so that it can be recovered in case of a ransomware attack.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\r\n<\/ul>\r\n<h3><span class=\"TextRun SCXW246349081 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW246349081 BCX0\">Quick Heal Protection:<\/span><\/span><span class=\"EOP SCXW246349081 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\r\n<ul>\r\n<li>\r\n<p><span style=\"color: #000000;\">Ransom.Royal.S29629175<\/span><\/p>\r\n<\/li>\r\n<li>\r\n<p><span style=\"color: #000000;\">Ransom.Royal.S28994725<\/span><\/p>\r\n<\/li>\r\n<\/ul>\r\n<p><strong>To know more about Quick Heal\u2019s range of digital protection visit &#8211;\u00a0<\/strong><\/p>\r\n<p><a href=\"https:\/\/www.quickheal.com\/\">https:\/\/www.quickheal.com\/<\/a><\/p>\r\n<h3 align=\"JUSTIFY\"><span class=\"TextRun SCXW236711847 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW236711847 BCX0\">Conclusion<\/span><span class=\"NormalTextRun SCXW236711847 BCX0\">:<\/span><\/span><span class=\"EOP SCXW236711847 BCX0\" data-ccp-props=\"{&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\r\n<p align=\"JUSTIFY\">The Royal Ransomware encrypts files with \u201c.royal\u201d while some other variants use the extensions &#8220;.royal_w&#8221; and &#8220;royal_u.\u201d It has the unique feature of encryption through ep mode, which allows Royal Ransomware to modify the encryption percentage based on the file size<b>. <\/b><\/p>\r\n<p>As Royal ransomware uses a similar encryption technique to Conti, we suspect that the Conti group might be involved in this.<\/p>\r\n<h3 align=\"JUSTIFY\"><span class=\"TextRun SCXW200344629 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW200344629 BCX0\">MITRE ATT&amp;CK TTPs:<\/span><\/span><span class=\"EOP SCXW200344629 BCX0\" data-ccp-props=\"{&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\r\n<table style=\"height: 422px;\" border=\"1\" width=\"647\" cellspacing=\"0\" cellpadding=\"7\">\r\n<tbody>\r\n<tr valign=\"TOP\">\r\n<td width=\"297\">\r\n<p align=\"JUSTIFY\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"color: #333333;\"><b>Command and Scripting Interpreter<\/b><\/span><\/span><\/p>\r\n<\/td>\r\n<td width=\"297\">\r\n<p align=\"JUSTIFY\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"color: #333333;\"><b>T1059<\/b><\/span><\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr valign=\"TOP\">\r\n<td width=\"297\">\r\n<p align=\"JUSTIFY\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"color: #333333;\"><b>Inhibit System Recovery<\/b><\/span><\/span><\/p>\r\n<\/td>\r\n<td width=\"297\">\r\n<p align=\"JUSTIFY\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"color: #333333;\"><b>T1490<\/b><\/span><\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr valign=\"TOP\">\r\n<td width=\"297\">\r\n<p align=\"JUSTIFY\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"color: #333333;\"><b>File and Directory Discovery<\/b><\/span><\/span><\/p>\r\n<\/td>\r\n<td width=\"297\">\r\n<p align=\"JUSTIFY\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"color: #333333;\"><b>T1083<\/b><\/span><\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr valign=\"TOP\">\r\n<td width=\"297\">\r\n<p align=\"JUSTIFY\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"color: #333333;\"><b>System Information Discovery<\/b><\/span><\/span><\/p>\r\n<\/td>\r\n<td width=\"297\">\r\n<p align=\"JUSTIFY\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"color: #333333;\"><b>T1082<\/b><\/span><\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr valign=\"TOP\">\r\n<td width=\"297\">\r\n<p align=\"JUSTIFY\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"color: #333333;\"><b>Data Encrypted for Impact<\/b><\/span><\/span><\/p>\r\n<\/td>\r\n<td width=\"297\">\r\n<p align=\"JUSTIFY\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"color: #333333;\"><b>T1486<\/b><\/span><\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr valign=\"TOP\">\r\n<td width=\"297\">\r\n<p align=\"JUSTIFY\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"color: #333333;\"><b>Service Stop<\/b><\/span><\/span><\/p>\r\n<\/td>\r\n<td width=\"297\">\r\n<p align=\"JUSTIFY\"><span style=\"font-family: Times New Roman, serif;\"><span style=\"color: #333333;\"><b>T1489<\/b><\/span><\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<h3 align=\"JUSTIFY\"><span class=\"TextRun SCXW13559748 BCX0\" lang=\"EN-IN\" xml:lang=\"EN-IN\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW13559748 BCX0\">IOCs:<\/span><\/span><span class=\"EOP SCXW13559748 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h3>\r\n<p align=\"JUSTIFY\"><span style=\"color: #000000;\"><span style=\"font-family: Calibri, serif;\">250BCBFA58DA3E713B4CA12EDEF4DC06358E8986CAD15928AA30C44FE4596488 <\/span><\/span><\/p>\r\n<p align=\"JUSTIFY\"><span style=\"color: #000000;\"><span style=\"font-family: Calibri, serif;\">15D4A2FC500DFA55A64221A0A38D9C47510D8D348D3289C89D26E6184DDD51FF<\/span><\/span><\/p>\r\n<p align=\"JUSTIFY\"><span style=\"color: #000000;\"><span style=\"font-family: Calibri, serif;\">491C2B32095174B9DE2FD799732A6F84878C2E23B9BB560CD3155CBDC65E2B80 <\/span><\/span><\/p>\r\n<p align=\"JUSTIFY\"><span style=\"color: #000000;\"><span style=\"font-family: Calibri, serif;\">312F34EE8C7B2199A3E78B4A52BD87700CC8F3AA01AA641E5D899501CB720775 <\/span><\/span><\/p>\r\n<p align=\"JUSTIFY\"><span style=\"color: #000000;\"><span style=\"font-family: Calibri, serif;\">87EED751035A0BCCE040079E48545A7265E1A0C7D4BCAF0B37A8A70D833FEAFC <\/span><\/span><\/p>\r\n<p align=\"JUSTIFY\"><span style=\"color: #000000;\"><span style=\"font-family: Calibri, serif;\">42EEC2B721E59640D7B88202B80D2D9A5C84BF34534396098A497A60EF5EBB97 <\/span><\/span><\/p>\r\n<p align=\"JUSTIFY\"><span style=\"color: #000000;\"><span style=\"font-family: Calibri, serif;\">8E01ECF9D804454F34EECEB0F7793F4884BE8868886A646526419FC2E2BBB648 <\/span><\/span><\/p>\r\n<p align=\"JUSTIFY\"><span style=\"color: #000000;\"><span style=\"font-family: Calibri, serif;\">BED8C25DD445B9B9A782291C00F9839890A09459A2A568153491B2F47BBD1463<\/span><\/span><\/p>\r\n<p align=\"JUSTIFY\">\u00a0<\/p>\r\n<p><b><span data-contrast=\"none\">Co-Author:<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\r\n<p><b><span data-contrast=\"none\">Soumen Burma<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>The rise of ransomware and malware variants has been a growing concern for individuals and organizations alike. With new strains of malicious software emerging every day, the threat landscape has become increasingly complex and dangerous. Let&#8217;s delve into the world of ransomware and explore how we can protect ourselves against this ever-evolving threat. Introduction\u00a0 The [&hellip;]<\/p>\n","protected":false},"author":60,"featured_media":91647,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75,910],"tags":[1851,1953,1954,1982,1983,331,1984,1249],"class_list":["post-91613","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-windows","category-ransomware","tag-cyberrisks","tag-malwareattack","tag-quickhealsolutions","tag-ransomware-cybersecurity","tag-royal-ransomware","tag-encryption","tag-ransomware-attack","tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91613"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/60"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=91613"}],"version-history":[{"count":27,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91613\/revisions"}],"predecessor-version":[{"id":91741,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/91613\/revisions\/91741"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/91647"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=91613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=91613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=91613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}